Individual Responsibility for Information Security 1 Introduction

advertisement
Individual Responsibility for
Information Security
Document Type:
Document Owner:
Approved by:
Policy
Information Security Manager
Corporate HR (Oct 01, 2010)
CIO (Oct 01, 2010)
Revision No:
Revision Date:
Information Classification:
2.2
March 04, 2011
INTERNAL
1 Introduction
All of us have an interest in SCA’s success. The success of SCA is to a large degree determined by
information, knowledge and experience. Our market position and jobs are endangered if
competitors obtain information about our research activities, product development and launches
or other business strategies. In addition our position as a sustainable company with a good
reputation on the stock market as well as within the society as a whole will be endangered if we
are not able to uphold a high level of information security. It is of vital importance that these
values are appropriately protected.
The purpose of this policy is to protect SCA’s business and the interests of shareholders,
customers, partners, employees and others.
This document describes the rules and guidelines for protecting information and the use of
computers, networks, information systems and Internet (IT resources) within SCA. The rules
apply to all employees, independent contractors, temporary workers and every other user of
SCA’s information technology resources (Users). The implementation of this policy should
always be in compliance with applicable laws and regulations. SCA HR organization is
responsible for that all concerned users sign this policy.
1.1
Basic Premises
The basic premise, on which this policy is based, are that IT resources of SCA are owned by SCA
and represent work tools used in the service of the company. Moreover, the company should not
incur damages, liabilities or other unnecessary costs due to inappropriate use of these work tools.
1.2
Individual Responsibilities
By following this policy, you will meet SCA expectations and contribute your part in protecting
SCA values.
Non-compliance with this policy may result in disciplinary and/or administrative actions. Serious
violations, as disclosure of confidential information or serious misuse of provided IT resources,
may result in termination of employment and legal actions.
1.3
Private Use of IT Resources
Access to IT resources is provided to Users to enable work efficiency. However, reasonable and
minimal use of IT resources for personal purposes is acceptable provided that the usage does not
interfere with any commitments towards or by SCA and that the usage does not result in
substantial costs for SCA.
Individual Responsibility for InfoSec 101001.doc
- 1/7 -
Individual Responsibility for
Information Security
2 Monitoring
The use of IT resources will be monitored without prior notice or permission whenever
monitoring, in the SCA’s opinion, is justified. Monitoring the individuals’ use of IT resources
shall however always be exercised in the light of the following two general principles.
•
•
Monitoring and use of information obtained during monitoring shall always be in
compliance with applicable laws and regulations.
Monitoring shall not constitute a manifest infringement on an employee’s personal
privacy unless the measures is taken for an authorised purpose and is seen to be an
admissible intrusion into an employee’s personal privacy having regard to the purpose
justifying the measure.
Monitoring may for example occur for the following purposes.
• Monitoring during the normal course of system and network administration.
• Monitoring for the investigation of suspected conduct, performance failings or violation
of this policy.
• Monitoring for the prevention of spreading confidential information.
• Routine monitoring of e-mail traffic flow and examination of e-mail for manual routing
where the message is undeliverable because of an incorrect e-mail address.
• Reviewing of work-related e-mail while the user is unavailable, to ensure that urgent
matters are dealt with.
SCA may be required to disclose electronically stored information to third parties pursuant to
legal proceedings or if required by authorities.
Monitoring for the investigation of suspected conduct takes only place after a written request
from relevant HR Manager. SCA Information Security Manager receives the request and
approves the monitoring. A system administrator will thereafter extract relevant data and send to
requesting HR Manager or his/her representative. Monitoring and review of the result of
monitoring will only be performed by a defined and limited number of individuals. SCA will
avoid, where possible, opening e-mails/documents clearly marked as private and confidential,
unless it is suspected that such material violate this policy.
3 Information Security Instructions
3.1
Be Aware
People are often referred to as the weakest link in an information security program. Through
either intentional or accidental misuse of access, people often leave networks and organisations
exposed. All too often, security programs tend to focus on technical controls rather than the
human factor. Therefore criminals use techniques such as social engineering 1 and phishing 2 to
gain access to systems and networks.
Social engineering is the act of manipulating people with trust to disclose confidential or personal information.
Phishing is a term used to describe a fraudulent attempt to get sensitive information such as passwords or credit
card details by masquerading as a trustworthy person in an e-mail or on Internet.
1
2
Individual Responsibility for InfoSec 101001.doc
- 2/7 -
Individual Responsibility for
Information Security
SCA security level and our success depend on your behaviour and common sense. For example,
when an unknown person is unaccompanied in SCA premises, confront and ask if you can help.
Be also aware that most threats towards an organisation come from the inside.
Make sure visitors to SCA premises do not oversee confidential information on displays,
whiteboards or on paper. Consider this risk when, for example, doing a walk around with a
customer. Demonstrating security awareness behaviour in meetings with customers or other
external parties shows credibility and trustworthiness.
3.2
Information Classification
How information and data is handled has a direct impact on SCA’s business and reputation.
Information classification is a means of classifying and defining how information should be
handled. SCA classifies information as follows:
Class
Public
Description
Information that is generally available to and
known by the public
Handling Principles
Get approval for publication.
Internal
Information that is not generally available to
and known by the public
To be treated as company
property.
Confidential
Internal information that is important to keep
confidential and be treated with care.
Be cautious!
Strictly
Confidential
Internal information that is extremely
important to keep confidential and that should
be treated with the utmost care.
Treat with utmost care.
Information may be Confidential or Strictly Confidential for various reasons. Making certain
information public may in some cases harm the company or any of its many different stakeholders
(employees, shareholders, financiers, business partners and others). It might also be that SCA have
taken on a contractual obligation not to disclose certain information or we might in some cases
even be obliged under law to treat certain information as confidential.
Users are responsible for protecting corporate information in their possession against loss,
falsification and misuse of any kind.
• Confidential and strictly confidential documents and data media must not be left
unattended, and must be locked away when not in use.
• Information kept in a PC (laptops) should always be stored in <My Document>. This
folder is encrypted and backup is taken automatically for this folder when connecting to
SCA network.
• Used or not needed confidential information should be securely disposed. For paper, use
shredder, non-erasable media (e.g. DVDs) to be physical destroyed; all not used IT
equipment should be returned to the IT organization.
See further in “Information Classification Standard”, http://intranet.sca.se/Awareness.
Individual Responsibility for InfoSec 101001.doc
- 3/7 -
Individual Responsibility for
Information Security
3.3
Your Password
Passwords are the front line of protection for user login accounts. A poorly chosen password
may result in unauthorized access to SCA’s entire corporate network.
Never use the same password to SCA systems as is used outside SCA or used privately.
SCA systems must be protected by strong passwords that are:
• at least eight characters in length
• a combination of both lower-case and capital letters as well as digits or other characters
• must be changed every 60 days, at a minimum
• password may not be re-used, a history file of 12 changes are kept
Users have a responsibility for activities and possible misuse originating from his or her accounts.
Therefore it is important that passwords are not disclosed to anyone, whether intentionally or
accidentally. It should not be written down in clear text or stored unencrypted. The password
must be changed immediately if suspected that it has been compromised.
3.4
In the Office
In SCA locations, visitors must always be checked in and obtain a visitor’s badge, identifying
them as approved to be in the building. Visitor badges give the opportunity to address visitors
and customers by name more easily, making them feel more welcome. They also provide added
security in SCA facilities. Therefore it is important that you, as SCA employee, carry badges for
identification.
To reduce the risk of a security breach, fraud and information theft caused by documents being
left unattended in SCA’s premises, a clear desk approach should be followed.
• Lock your computer (Ctrl-Alt-Delete, Enter) or (Start-L) whenever you leave a PC
unattended.
• Laptops left in the office overnight and during weekends must be put away. This will
make it more difficult for a thief to clear out all laptops in one burglary.
• Documents and data media must always be treated in such way that loss, damage,
destruction, confusion and unauthorized access is sufficiently prevented.
• Regularly shut down your computer to allow for patches being installed at start-up.
Examples:
9 Remove or lock away all confidential information after a conference. This includes flipcharts, notes on
whiteboard, and other notes.
9 After copying or printing a confidential document, make sure that nothing is forgotten in the office
machine (copy machine, printer and fax).
9 If a confidential or a strictly confidential document is found left behind, it should be sent to the owner. If
the owner cannot be determined, the found material should be sent to a senior manager.
Individual Responsibility for InfoSec 101001.doc
- 4/7 -
Individual Responsibility for
Information Security
3.5
Outside the Office
SCA Global Network (SGN) and SCA internal systems can be reached from outside SCA
premises through approved VPN 3 services, e.g. (ec)Access.
• The SCA VPN services provide increased protection when accessing Internet from
outside the office and must be used when technically possible.
• Computers and other devices with an installed VPN access to SGN must be properly
locked and protected.
• For laptops, USB devices, phones and other mobile equipment, which are taken outside
SCA premises, if confidential or strictly confidential information is stored on the
equipment; then this information must be strongly encrypted.
• Portable machines and external devices must not be left unattended anywhere in plain
sight, particularly in cars, hotel rooms or in public areas.
• It must be made sure that no unauthorized person can overhear an oral/telephone
conversation held in public, if confidential business information is being discussed.
3.6
•
•
•
Backup
All data should be stored on servers supported by a backup service.
When a user is offline, he/she is responsible for that backup is taken for data on the
client, e.g. a laptop. This is preferably done by an automatically synchronization service or
by manually copying the data to a server (e.g. home directory) where backup is taken.
When a so called “Personal Folder” is used in Outlook to archive e-mails, it is your own
responsibility to make a regular backup of the PST file. Check with your local IT support
how this is done.
3.7
Safe E-mail
Electronic messages must be treated like regular form of formal correspondence, and the content
and language utilised must be consistent with established company policy. Electronic messages
sent by anyone may be easily archived by other parties and made searchable over a long period of
time. Information sent over the Internet including electronic messages, can result in legal action
against SCA. Claims of defamation, breach of confidentiality or contract could arise from any
misuse or careless use of these facilities.
• Be sensitive to the content of your e-mail messages, especially when sent to people whose
culture and laws may be different from yours. Ensure that nothing you write in an e-mail,
or as a contributor to a discussion group could be libel, offensive or damaging to your
reputation, your colleagues or SCA.
• Activities conducted using an SCA e-mail address (i.e. firstname.lastname@sca.com)
reflect directly on SCA’s image and reputation. Users are not permitted to conduct
activities on any such account, which could embarrass or damage SCA’s image or
reputation.
• SCA e-mail address must be used with care and primarily for business purpose.
• Distribution of chain letters is prohibited. Delete chain letters or e-mails of similar nature.
Chain letters and fake virus warnings (hoaxes) will disrupt network traffic.
• Only authorized departments or persons must distribute warning messages.
VPN: Virtual Private Network – is a technique to create secure connections between two points in an insecure
network, e.g. Internet.
3
Individual Responsibility for InfoSec 101001.doc
- 5/7 -
Individual Responsibility for
Information Security
•
•
•
•
•
Be suspicious of e-mail attachments from unexpected sources. Never open them unless
you are sure they are genuine.
Never click on links within e-mails or documents from unexpected sources.
Company information must not reside on servers outside SCA’s control; therefore e.g.
forwarding of business e-mail to public e-mail services (like HOTMAIL) is prohibited.
E-mail messages and attachments classified as “Confidential” or “Strictly Confidential”
must be protected using encryption.
Digital signatures (alone or together with the encryption, if necessary) must be used for
those e-mails for which the integrity of the content or the legal responsibility of the
sender is to be ensured.
3.8
Using Internet
Internet is an excellent source of information for investigations and to make the work more
efficient. On the other hand, the use of Internet brings a number of threats making it important
to be observant and to use it with care.
• Act professionally to protect SCA’s proprietary and confidential information - never post
confidential information on Internet sites.
• Comply with the laws and ethics of the country from which you access the Internet - they
may not be the same as those of the country where you live.
• Remember that the Internet is a public forum, and that you represent SCA whenever you
use a SCA Internet gateway.
• When using social media 4 for corporate use, employees can only represent SCA in the
same role and capacity as in their daily work.
• Do not let other people think that you are publishing content or acting on behalf of SCA
as a company when using social media privately.
• It is strictly prohibited to view, download or handle material which can be considered
offensive or abusive (including but not limited to any material that could be perceived as
sexually explicit or offensive on the grounds of race, sexual orientation, national origin,
gender, disability, religious or political beliefs) on any SCA computer. In addition to being
a breach of this policy, downloading material may lead to criminal prosecution. Any
comments made via e-mail regarding the above areas are similarly prohibited.
3.9
•
•
Business Partners
Business partners must sign a non-disclosure agreement before obtaining access to
company proprietary systems or information.
If stricter rules for information security were contractually agreed upon with business
partners, or if a business partner demands stricter rules, they must be observed.
3.10 Incident Reporting
A security incident or breach (intentional or accidental) can be any event that threatens SCA
systems or information. This includes events such as virus infection, misuse of other’s
password/privilege, loss of data integrity, computer hacking, losing a smart phone, stolen PC
providing network access etc.
Social media: Internet based technology for many to many social interactions based on user generated content, e.g.
Internet forums (Facebook), blogs, wikies.
4
Individual Responsibility for InfoSec 101001.doc
- 6/7 -
Individual Responsibility for
Information Security
•
•
3.11
•
•
•
•
•
•
All incidents regardless of seriousness should be reported. The incidents should normally
be reported to local or regional ServiceDesk. However, incidents of sensitive or
confidential nature should be reported to SCA Information Security Manager. Incident
reports are one of the best sources for understanding needed security level.
Any suggestions of improvements regarding security are most valuable and can be
forwarded through the Service Desk.
Acceptable Use
All connections and other adjustments to computers or other equipment in the
company’s network, without exception, must have prior approval from the IT
department. Restrictions exist in connecting mobile devices to SCA internal networks.
The user is responsible for the security of his or her computer/personal device.
Users may only use SCA business information for the proper business purpose of SCA,
and as instructed by officials, e.g. line managers.
Ensure that you comply with local privacy legislation relating to the storage and
communication of personal information. Be ethical in the way you handle personal
information concerning colleagues and other individuals.
Only authorized and fully licensed software may be installed or used on company systems.
IT management must authorize all software and installation must be under control of
SCA IT organisation.
CDs, DVDs, or USB sticks from unexpected sources should not be used or connected to
SCA equipment.
3.12 Intellectual Property
SCA’s intellectual property rights, confidential information and data as well as the intellectual
property, information and data of its customers and partners, are highly valuable corporate assets.
As such they must be protected from deliberate, unintentional or unauthorized alteration,
copying, destruction and inappropriate disclosure or dissemination and are to be used only in
accordance with established SCA policy, standard and all applicable laws and regulations in
countries or states in which SCA and its affiliates operate.
Intellectual property legislation, i.e. copyright and patent, prohibits duplication and alteration of
material without authorization. It is not permitted to distribute or download or upload pirated
software or any material including but not limited to music/sound, films, audio visual recordings,
texts databases, images, photographs and logos without obtaining the necessary permission from
the owners of such works.
4 Further Help and Information
Your local IT or HR organization can deal with any questions you may have regarding this policy
or the correct use of IT resources. Your manager or supervisor can also, if needed, help you to
interpret the policy.
Some of the topics mentioned in this policy are defined in more detail in other documents and
can be found on the SCA Information Security homepage http://intranet.sca.se/InfoSec.
Individual Responsibility for InfoSec 101001.doc
- 7/7 -
Individual Responsibility for
Information Security
Approval
I have understood and accept the conditions and rules for protecting SCA information and using
SCA IT resources as described in policy Individual Responsibility for Information Security. I
will to the best of my ability act accordingly.
__________________________________
Date
__________________________________
Name
__________________________________
Signature
Individual Responsibility for InfoSec 101001.doc
- Enclosure -
Download